mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
96 lines
3.4 KiB
JSON
96 lines
3.4 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-32881",
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Danswer is the AI Assistant connected to company's docs, apps, and people. Danswer is vulnerable to unauthorized access to GET/SET of Slack Bot Tokens. Anyone with network access can steal slack bot tokens and set them. This implies full compromise of the customer's slack bot, leading to internal Slack access. This issue was patched in version 3.63."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-285: Improper Authorization",
|
|
"cweId": "CWE-285"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "danswer-ai",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "danswer",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "< 0.3.63"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://github.com/danswer-ai/danswer/security/advisories/GHSA-xr9w-3ggr-hr6j",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/danswer-ai/danswer/security/advisories/GHSA-xr9w-3ggr-hr6j"
|
|
},
|
|
{
|
|
"url": "https://github.com/danswer-ai/danswer/commit/89ff07a96b41be9e05256bd252105be233f4d28a",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/danswer-ai/danswer/commit/89ff07a96b41be9e05256bd252105be233f4d28a"
|
|
},
|
|
{
|
|
"url": "https://github.com/danswer-ai/danswer/commit/bd7e21a6388775e850d6f716675a893c72881e56",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/danswer-ai/danswer/commit/bd7e21a6388775e850d6f716675a893c72881e56"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-xr9w-3ggr-hr6j",
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |